Using Appcelerator Titanium and Figma to simulate a Derby App

 For our assignment this week ( Assignment 8), my aim is for you to understand how Appcelerator Titanium would be used to build a Derby app – a Derby menu. Like last week, we will use a design/modeling tool (Figma) https://www.figma.com to design an app interface that looks like the one in Figure 10-10, p. 295. This can be an interface for iOS, Android, or Windows phone (your choice). Although we can only see a top view from the figure, several UI elements are needed to make the app functional. Our authors provide both a description and the associated JavaScript code for each UI element that can be used to create the Derby app (pp.292-307). In addition to modeling, your goal is to choose at least six (6) UI elements which you would use. Explain what and how these UI elements contribute to your app functionality as you modeled. If possible, draw a line on the interface to the UI functionality and explain. Remember that although you are using Titanium Studio, you are actually developing an iOS, Android, or Windows app. Therefore, discuss use of particulars for that platform. For example: a VIEW  is a basic UI element for either iOS or Android – Android apps always need “accelerator”  and “GPS” UI functionality; whereas these are native (built-in) for the iOS platform, etc. Discuss “JSON is your friend” (p. 302), regardless of which app platform you are building.

  • First download and install Figma (can use comparable SW of your choice) on your computer. This is same as last week.

Make one screen shot here that shows you have install the Figma wireframing tool (or a comparable tool of your choice )* You are ready to start adding UI elements for (to model) your app matching the layout shown in Figure 10-10, p. 295

  • Use Figma widgets/icons and create a mock interface (add at least six appropriate UI elements) that follow and match the Figure 10-10 example 

* Your app is using JavaScript coding, but you ARE NOT required to do/show any coding for this assignment.  Make a second screen shot showing the final placement of the UI elements on your model. Except for coding, this is a simulated app as it would appear if you used Titanium Studio. Lastly, review the coding that our authors provide (pp. 292-307); based on that coding:Write a brief explanation of each UI element you used – try to explain what specific function/method each UI provides that make your app functional.These two screen shots and UI explanations is the deliverable for Assignment. If you used supporting literature/videos other than your own, remember to properly cite and then include an APA style reference list.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DB Management Systems

 

  • Topics
    1. Suppose you never learn database and have no idea about database, as you need to manage your data, what will you do? 
    2. Why shall we use Database Systems? Is it a must or a good way/idea to manage/handle data?
  • DifferenceData WarehouseData LakeData StructureProcessedRawPurpose of DataCurrently In UseNot Yet Determined; more diversityUsersBusiness ProfessionalsData ScientistsAccessibilityHighly accessible and quick to updateMore complicated and costly to make changesFrom definition, both of Data warehouses & Data lakes are widely used for big data application and belong to high-level purpose of storing data. A data warehouse is close to as a repository to store those structured, filtered, or processed data for specific purposes. A data lake can be a very large pool/lake that stores raw data (but data has been collected through a lot of different sources and maybe not exactly raw data feed/input into the system), the purpose is then more close to not defined. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risk Assessment plan

Use the scenario in the attached file to develop create an outline of a Risk assessment plan, complete some sections such as the introduction, scope etc.; research and summarize relevant compliance laws; and create a schedule. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

electronic innovation and the government

Complete  a review of the article by writing a 3 page overview of the  article. This will be a detailed summary of the journal article,  including concepts discussed and findings. Additionally, find one other  source (it does not have to be a peer-reviewed journal article) that  substantiates the findings in the article you are reviewing.

Paper 1:

https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.614.7867&rep=rep1&type=pdf

Paper 2:

Use the attached pdf

Be approximately 5 – 6 pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Management: A Systems Approach to Planning, Scheduling, and Controlling

 

You will have a two-part team project due in Weeks 9 and 10. The first part will be a research paper that outlines the components of a successful project. The second part will be application of these components to a project (real or fictitious) that you and your team mates are planning to start in a comprehensive Project Plan. Each paper should have a presentation to accompany it.

Guidelines:

  • For Part 2, remember to give me some context with regard to your project selection. Tell me what kind of business/organization it is, the goals of the project, and why it is important to complete the project.
  • Use your textbook as your primary source of information and current research (no more than 5 years old) to supplement it.
  • The papers must be written in APA style with references formatted in APA style, including a References page.
  • Presentations can take any form you like—be creative!

All written work must be submitted in the student’s own words with sources properly attributed in APA format. For your convenience, the correct in-text citation for your textbook is  (Kerzner, 2013). The correct in-text citation for your Case Studies book is (Kerzner, Project Management: Case Studies, 2013).

The correct full-text references for each book appear below:

Kerzner, H. (2013). Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th ed. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118418550/

Kerzner, H. (2013). Project Management: Case Studies. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118415825/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cyber Security Issues Presentation

 PLEASE USE SOURCES PROVIDED AND ONLY USE EXTERNAL IF IT IS THE LAST OPTION

Research and learn about the three topics listed below. 

1.  Dataveillance  

2.  Cryptography

4.  Mobile Phone 

5.  Browser fingerprinting  

6.  Online Scams  

7. Cryptojacking

8. Cyber-Physical Attacks

9. IOT Attacks

10. Phishing

11. Ransomware

12. Worm 

13. Bluejacking

14. Blue Snarfing

15. Passwords

16. “Juice Jacking”

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)

Requirements:

Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation

Upload your presentation in the assignment box.

Additional Sources: 
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/ 
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SWOT (Abstract & intro) 3+ page

For attached KFC organization (), Conduct SWOT analysis and discuss the components (Strengths, Weaknesses,Opportunities,Threats)

For this assignment need below:

Abstract (75-100 words):  on a separate page

Introduction: 1 page

Overview of the organization:2+ page

 * Identify the type of business organization and strategies

 * Key players

 * Competitors

 * Organizational Structure

 * Organizational Strategy (low cost; differentiation; etc.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Multifactor Authentication (MFA

 Multifactor Authentication (MFA) (aka Two-Factor Authentication (TFA)) is often used to supplement a PIN/password or to replace them. In 2-3 paragraphs, explain how it works using real-world examples. Include applications or programs used for MFA/TFA. 

250 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

INFORMATION SECURITY Security fundamentals

  

Task

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

 Answers MUST be written in your own words. If an answer contains more than 10% direct quote (referenced or unreferenced), 0 marks will be awarded for this question. One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1   [5 Marks]

Automated Teller Machines (ATM) are designed so that users will provide a personal identification number (PIN) and a card to access their bank accounts. Give examples of confidentiality, integrity and availability requirements associated in such a system and describe the degree of importance for each requirement.

Question 2   [5 Marks]

A thief broke into an Automated Teller Machine (ATM) using a screwdriver and was able to jam the card reader as well as breaking five keys from the keypad. The thief had to halt the process of break-in and hide, as a customer approached to use the ATM. The customer was able to successfully enter their ATM card, punch in the 4 digit PIN and was able to draw out some cash. Since the card reader was jammed, the customer was however not able to withdraw the ATM card, and drove off to seek some help. In the meantime, the thief came back and decided to try to discover the customer’s PIN so that he can steal money from the customer. You are required to calculate the maximum number of PINs that the thief may have to enter before correctly discovering the customer’s PIN?

Question 3   [5 Marks]

Thinking about bio-metric authentication, list three reasons why people may be reluctant to use bio-metrics. Describe various ways of how to counter those objections.

Question 4   [5 Marks]

In bio-metric authentication, false positive and false negative rates can be tuned according to the requirement, and they are often complementary i.e. raising one lowers the other. Describe two circumstances where false negatives are significantly more serious than false positives.

Question 5    [10 Marks]

Transposition is one known method of encrypting the text. What can be one way that a piece of cipher text can be determined quickly if it was likely a result of a transposition? Utilising some of the decryption techniques (substitution and others) covered in the subject so far, you are required to decipher (find the plain text) the cipher text that will be proviced to you closer to the assessment due date via the subject site. In order to present your solution, you need to demonstrate and explain the steps taken to decipher this text.

Rationale

This assessment task will assess the following learning outcome/s:

  • be able to justify security goals and the importance of      maintaining the secure computing environment against digital threats.
  • be able to explain the fundamental concepts of      cryptographic algorithms.
  • be able to examine malicious activities that may affect      the security of a computer program and justify the choice of various      controls to mitigate threats.
  • be able to compare and contrast foundational security      policies and models that deal with integrity and confidentiality.
  • The assessment must be submitted electronically with a      Cover Page that includes the following information:
    • Assessment No
    • Assessment Title
    • Student Name & ID
    • Subject Name and Code
    • Student Email Address
  • Students must ensure that all tasks/questions are      identified clearly with headings.
  • Answers to the questions must be in your own words and      should be precise but complete and informative. No marks will be awarded      for any answer containing more than 10% direct quotes (referenced or un      referenced).
  • APA reference style must be used throughout the      document with the bibliography at the end of the document. In-text citations      should also follow APA style. APA referencing guide can be accessed via      the following link.  This also forms a part of the marking 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 7

Question c.1 page 407 Chapter 9

1.       Question – Suppose you are testing the null hypothesis that a mean equal 75 versus a two-tailed alternative. If the true (but unknown) mean is 80, what kind of error might you make? When will you not make this error?


Question C.3 page 408 Chapter 9

2.       Question – Explain exactly what it means for a test statistic to fall in the rejection region.


Question C.8 page 408 Chapter 9

3.       Question – Suppose that you wish to test a researcher’s claim that the mean height in meters of a normally distributed population of rose bushes at a nursery has increased from its commonly accepted value of 1.60. To carry out this test, you obtain a random sample of size 150 from this population. This sample yields a mean of 1.80 and a standard deviation of 1.30. What are the appropriate null and alternative hypotheses? Is this a one-tailed or two-tailed test?

==================================================
I’m Attaching text book for the reference, Questions are from this text book.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now